OTPulse

Advantech WebAccess Vulnerabilities

Act NowICS-CERT ICSA-14-079-03Dec 21, 2014
Summary

Advantech WebAccess versions 7.1 and earlier contain four critical vulnerabilities: SQL injection (CWE-89) allowing database access, stack buffer overflow (CWE-121) enabling code execution, insecure file access via path traversal (CWE-538), and OS command injection (CWE-77) permitting arbitrary system command execution. These flaws are accessible over the network and may not require authentication, allowing remote compromise of the WebAccess server and any connected industrial control systems it manages.

What this means
What could happen
WebAccess ≤7.1 contains multiple critical vulnerabilities (SQL injection, buffer overflow, path traversal, and OS command injection) that could allow an attacker with network access to execute arbitrary code, extract sensitive data, or completely compromise the system running the HMI/SCADA interface.
Who's at risk
This affects any organization running Advantech WebAccess version 7.1 or earlier as an HMI (Human Machine Interface) or SCADA data server. Water utilities, power systems, manufacturing plants, and other critical infrastructure using WebAccess for process monitoring and control should prioritize this immediately.
How it could be exploited
An attacker could send crafted HTTP requests to the WebAccess web interface targeting SQL injection (CWE-89) or command injection (CWE-77) flaws in input handling. Buffer overflow (CWE-121) and path traversal (CWE-538) vulnerabilities could be chained to bypass authentication or write files to arbitrary locations. Exploitation could occur over the network without prior authentication on vulnerable versions.
Prerequisites
  • Network access to WebAccess web interface (typically port 80/443)
  • WebAccess version 7.1 or earlier running
Remotely exploitableNo authentication requiredLow complexity exploitationHigh EPSS score (54.6%)No vendor fix availableMultiple vulnerability types (SQL injection, buffer overflow, command injection)Affects supervisory control systems
Exploitability
High exploit probability (EPSS 54.6%)
Affected products (1)
ProductAffected VersionsFix Status
WebAccess: <=7.1≤ 7.1No fix (EOL)
Remediation & Mitigation
0/5
Do now
0/3
HOTFIXUpgrade WebAccess to a version newer than 7.1 if available from Advantech
HARDENINGIf upgrade is not possible, implement network segmentation to restrict access to the WebAccess server to only authorized engineering workstations and control systems on isolated network segments
WORKAROUNDImplement a Web Application Firewall (WAF) or reverse proxy to filter malicious input patterns (SQL keywords, shell metacharacters, path traversal sequences) before they reach WebAccess
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

WORKAROUNDMonitor WebAccess access logs for suspicious HTTP requests containing SQL keywords (UNION, SELECT), shell commands, or path traversal patterns (../, etc.)
HARDENINGConduct a comprehensive security assessment of WebAccess configurations and any systems it interfaces with to detect unauthorized changes or data exfiltration
↑↓ Navigate · Esc Close
API: /api/v1/advisories/de26fa66-ec66-4b3a-b516-b374dfa456f4
Advantech WebAccess Vulnerabilities - OTPulse